CVE-2018-10689Improper Restriction of Operations within the Bounds of a Memory Buffer in Blktrace

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 64.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 3
Latest updateMay 13

Description

blktrace (aka Block IO Tracing) 1.2.0, as used with the Linux kernel and Android, has a buffer overflow in the dev_map_read function in btt/devmap.c because the device and devno arrays are too small, as demonstrated by an invalid free when using the btt program with a crafted file.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages9 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-pr22-23wp-22hm: blktrace (aka Block IO Tracing) 12022-05-13
OSV
CVE-2018-10689: blktrace (aka Block IO Tracing) 12018-05-03

📋Vendor Advisories

3
Microsoft
blktrace (aka Block IO Tracing) 1.2.0 as used with the Linux kernel and Android has a buffer overflow in the dev_map_read function in btt/devmap.c because the device and devno arrays are too small as 2018-05-08
Red Hat
blktrace: buffer overflow in the dev_map_read function in btt/devmap.c2018-05-02
Debian
CVE-2018-10689: blktrace - blktrace (aka Block IO Tracing) 1.2.0, as used with the Linux kernel and Android...2018

💬Community

2
Bugzilla
CVE-2018-10689 blktrace: buffer overflow in the dev_map_read function in btt/devmap.c2018-05-04
Bugzilla
CVE-2018-10689 blktrace: buffer overflow in the dev_map_read function in btt/devmap.c [fedora-all]2018-05-04